Mobile botnet detection: Proof of concept

Nowadays mobile devices such as smartphones had widely been used. People use smartphones not limited for phone calling or sending messages but also for web browsing, social networking and online banking transaction. To certain extend, all confidential information are kept in their smartphone. As a r...

Full description

Saved in:
Bibliographic Details
Main Authors: Z, Abdullah,, M.M., Saudi,, N.B, Anuar,
Format: Conference Paper
Language:en_US
Published: Institute of Electrical and Electronics Engineers Inc. 2015
Subjects:
Online Access:http://ddms.usim.edu.my/handle/123456789/9216
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays mobile devices such as smartphones had widely been used. People use smartphones not limited for phone calling or sending messages but also for web browsing, social networking and online banking transaction. To certain extend, all confidential information are kept in their smartphone. As a result, smartphones became as one of the cyber-criminal main target especially through an installation of mobile botnet. Eurograbber is an example of mobile botnet that being installed via infected mobile application without victim knowledge. It will pretense as mobile banking application software and steal financial transaction information from victim's smartphone. In 2012, Eurograbber had caused a total loss of USD 47 Million accumulatively all over the world. Based on the implications posed by this botnet, this is the urge where this research comes in. This paper presents a proof of concept on how the botnet works and the ongoing research to detect and respond to the mobile botnet efficiently. Detection of botnet malicious activity is done through an analysis of Crusewind Botnet code using reverse engineering process and static analysis technique.